2022 13th International Conference on Information and Communication Technology Convergence (ICTC)最新文献

筛选
英文 中文
Efficient Extreme Motion Planning by Learning from Experience 从经验中学习有效的极限运动规划
Kyungjae Lee
{"title":"Efficient Extreme Motion Planning by Learning from Experience","authors":"Kyungjae Lee","doi":"10.1109/ICTC55196.2022.9952449","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952449","url":null,"abstract":"In this paper, we propose the segment-based roadmap (SRM) method for extreme motion planning. Unlike existing roadmap-based approaches, each vertex in the SRM contains a sequence of configurations. This segment-based motion planning can effectively handle the narrow passage problem caused by stability constraints in a high dimensional space. The SRM is generated from trajectory examples and trajectory optimization. We extract motion segments from the trajectory examples. The extracted motion segments and its connection is stored in vertex set and edge set, respectively. Furthermore, a trajectory optimization method is used to increase the con-nectivity of the SRM. In particular, a Gaussian random path (GRP) is used to initialize the trajectory optimization problem and shown to be more effective in terms of final cost as well as the running time. In simulation study, the average final cost using the GRP initialization shows 96.7% improvements compared to the initialization with linear interpolation which is often used in practice. In experiment study, we conducted experiments on NAO in order to verify the proposed motion planner using the SRM.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121452468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crisis analysis on blockchain-based decentralized learning in wireless networks 基于区块链的无线网络去中心化学习的危机分析
J. Lee, Gyungmin Kim, Yonggang Kim
{"title":"Crisis analysis on blockchain-based decentralized learning in wireless networks","authors":"J. Lee, Gyungmin Kim, Yonggang Kim","doi":"10.1109/ICTC55196.2022.9952554","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952554","url":null,"abstract":"The nodes may perform data training and make decisions according to the learning results for better performance in wireless networks. However, to guarantee privacy-preserving service, learning model parameters are exchanged among the nodes instead of exchanging the original raw data obtained at each node. Although the information exchange could be performed in a distributed manner by exploiting blockchain for verification, there still exist problems of jamming attacks in wireless channels. The jammers may interrupt transactions requests toward the normal nodes works as miners or try to corrupt the information. In this paper, we provide analysis results that blocks originated from attackers with jamming capabilities becomes main stream. Through numerical results, we show that attacks to normal miners are highly likely to be succeed by the attackers with jamming abilities even though the computing power sum of attackers is less than 51% in wireless networks.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124098734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supervised vs. Self-supervised Pre-trained models for Hand Pose Estimation 手部姿势估计的监督vs.自监督预训练模型
Gyusang Cho, Chan-Hyun Youn
{"title":"Supervised vs. Self-supervised Pre-trained models for Hand Pose Estimation","authors":"Gyusang Cho, Chan-Hyun Youn","doi":"10.1109/ICTC55196.2022.9953011","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9953011","url":null,"abstract":"Fully-supervised learning and self-supervised learning are two standard learning frameworks for training visual representations. While the superiority and inferiority of the two frameworks are not obscured when pre-training is performed, this paper aims to compare the transferability performance for the hand posture estimation task. We conduct the experiment on a supervised pre-trained model and 5 self-supervised pre-trained models. To this end, we conclude that self-supervised pre-trained models do not necessarily outperform their supervised pre-trained counterparts, while self-supervised pre-trained models lead to faster convergence of the neural network.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126484698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OneVisionNFP - Design and Implementation of Agile Private/Public 5G/B5G Network Federation Platform OneVisionNFP——敏捷私有/公共5G/B5G网络联合平台的设计与实现
M. Park, Yoonwan Ma, T. Choi
{"title":"OneVisionNFP - Design and Implementation of Agile Private/Public 5G/B5G Network Federation Platform","authors":"M. Park, Yoonwan Ma, T. Choi","doi":"10.1109/ICTC55196.2022.9952420","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952420","url":null,"abstract":"In the 5G and Beyond Era there are interesting trends on requirements for Federated Distributed Open Platforms (DOPs) for Cross-Industry Sectors End-to-End (E2E) Services Innovation and Delivery Agility. The DOPs should be formed by way of Federations of ICT Network Facilities and other Types of Assets or Facilities that are owned by various sectors (including public sector ICT infrastructures, enterprise/private ICT infrastructures, government owned infrastructures, Research Institutes, and other Stakeholders). Such a Concept of Cross-Industry End-to- End Services Innovation and Delivery Agility in the 5G & Beyond Era and the associated Ecosystem that would emerge DO NOT EXIST yet. This paper proposes an architecture to enable cross-industry DOP network federation and our proof of concept implementation, OneVisionNFP•","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115775235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AB-XLNet: Named Entity Recognition Tool for Health Information Technology Standardization 卫生信息技术标准化命名实体识别工具AB-XLNet
Kyoungsu Oh, Min Kang, SeoHyun Oh, Do-hyoung Kim, Seokhwan Kang, Youngho Lee
{"title":"AB-XLNet: Named Entity Recognition Tool for Health Information Technology Standardization","authors":"Kyoungsu Oh, Min Kang, SeoHyun Oh, Do-hyoung Kim, Seokhwan Kang, Youngho Lee","doi":"10.1109/ICTC55196.2022.9952819","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952819","url":null,"abstract":"We conducted a study to identify drug-related information on non-standardized on non-standardized discharge summaries using a pre-trained BERT-based model. After tokenizing the dataset, it was identified with the IOB tagging schema and trained on the training data with the Random Insert technique through the pre-trained BERT. As a result, the F1-score of AB-XLNet was improved by 3% compared to XLNet, and ADE and Form, which could not be extracted from XLNet, were extracted. Future research will focus on presenting a generalized model using large amounts of data from multiple institutions.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115856474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework to Combat COVID19 like Pandemic in Future 未来抗击covid - 19大流行的框架
Murad Khan, Teef S. Alenezi, Shouq S. Alenezi, Sara S. Alenezi, Albandari A Alenezi, Basil Alothman, C. Joumaa
{"title":"A Framework to Combat COVID19 like Pandemic in Future","authors":"Murad Khan, Teef S. Alenezi, Shouq S. Alenezi, Sara S. Alenezi, Albandari A Alenezi, Basil Alothman, C. Joumaa","doi":"10.1109/ICTC55196.2022.9952927","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952927","url":null,"abstract":"This paper outlines a framework to prevent the COVID19 like pandemics for visitors to buildings or sites that receive many visitors. The proposed system is used to detect visitors who have not worn a facemask, or visitors with high body temperature, communicate daily visitor data to the security officer, sound an alarm to notify the officer, and screen the visitors with the results of the measurements. Also, the proposed solution uses deep learning and computer vision techniques to detect the facemask. Further, a testbed is designed based on an Arduino microcontroller connected to a PC for collecting, processing, and storing the data. Furthermore, the proposed system used a contactless infrared temperature sensor to avoid any chance to transfer the COVID-like disease to normal visitors. Finally, we tested the system by passing many subjects with and without face masks and high temperatures. The accuracy of the system shows that the system accurately detects each subject with and without a face mask and with high temperatures.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132300921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Lock-free Binary Search Tree 无锁二叉搜索树研究综述
Sangjin Lee, Seokjoo Cho, K. Pham, Sunggon Kim, Yongseok Son
{"title":"A Survey on Lock-free Binary Search Tree","authors":"Sangjin Lee, Seokjoo Cho, K. Pham, Sunggon Kim, Yongseok Son","doi":"10.1109/ICTC55196.2022.9952812","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952812","url":null,"abstract":"Binary Search Tree is the data structure that has fast search speed and easy addition, removal of elements. Due to these advantages, binary search tree (BST) is one of the frequently used data structures of these days. However, most binary search tree schemes use locking technique to support multiple access of multiple threads for synchronization. Unfortunately, this locking techniques significantly reduce the performance of BST. Locking techniques block or spin the threads that has not obtained the lock until the thread that has obtained the lock completes its job. Thus, to improve the performance of BST, efficient concurrent programming technique should be applied, such as lock-free technique. In this paper, we conduct a comparison of existing lock-free/non-blocking BST methods. We analyze operations and evaluate the strengths and weaknesses of each schemes.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132471473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Vehicular Communication Methods 车载通信方法综述
Jaehwan Lee, Woongsoo Na
{"title":"A Survey on Vehicular Communication Methods","authors":"Jaehwan Lee, Woongsoo Na","doi":"10.1109/ICTC55196.2022.9952866","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952866","url":null,"abstract":"Recently, interest in vehicular applications has increased such as autonomous driving and vehicle platooning. The importance of supporting driving safety is becoming more prominent. In order to provide driving safety, the vehicle to vehicle (V2V) communication standard stipulates that a vehicle safety message is periodically broadcasted to nearby vehicles every 100 ms. However, as the number of vehicles on the road increases, communication channels become easily congested, making it difficult to transmit and receive safety messages thereby increase the risk of traffic accidents. In order to address the problem, various V2V communication methods that improve the existing channel contention method have been proposed. In this paper, we introduce and analyze the communication methods for vehicular communications.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129967593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Optimization of Placement, Beamwidth, and Power Allocation in the UAV-Enabled Network 无人机支持网络中布局、波束宽度和功率分配的联合优化
Jong Won, Do-Yup Kim, Jang-Won Lee
{"title":"Joint Optimization of Placement, Beamwidth, and Power Allocation in the UAV-Enabled Network","authors":"Jong Won, Do-Yup Kim, Jang-Won Lee","doi":"10.1109/ICTC55196.2022.9952708","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952708","url":null,"abstract":"In this paper, we consider an unmanned aerial vehicle (UAV)-enabled network in which a UAV equipped with a directional antenna relays data from a ground base station (GBS) to ground users (GUs). Under this system, we study a problem minimizing the weighted sum power consumption of the GBS and the UAV by jointly optimizing the location of the UAV, beamwidth of the directional antenna, and power allocation. To solve the problem, we develop a simple heuristic algorithm, and verify its effectiveness through simulation results.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130004768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Elastic Network Cache Control Using Deep Reinforcement Learning 基于深度强化学习的弹性网络缓存控制
Chunglae Cho, Seungjae Shin, H. Jeon, Seunghyun Yoon
{"title":"Elastic Network Cache Control Using Deep Reinforcement Learning","authors":"Chunglae Cho, Seungjae Shin, H. Jeon, Seunghyun Yoon","doi":"10.1109/ICTC55196.2022.9952648","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952648","url":null,"abstract":"Thanks to the development of virtualization technology, content service providers can flexibly lease virtualized resources from infrastructure service providers when they deploy the cache nodes in edge networks. As a result, they have two orthogonal objectives: to maximize the caching utility on the one hand and minimize the cost of leasing the cache storage on the other hand. This paper presents a caching algorithm using deep reinforcement learning (DRL) that controls the caching policy with the content time-to-live (TTL) values and elastically adjusts the cache size according to a dynamically changing environment to maximize the utility-minus-cost objective. We show that, under non-stationary traffic scenarios, our DRL-based approach outperforms the conventional algorithms known to be optimal under stationary traffic scenarios.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130119015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信